The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libssh | Libssh | * | 0.6.2 (including) |
Libssh | Libssh | 0.4.7 (including) | 0.4.7 (including) |
Libssh | Libssh | 0.4.8 (including) | 0.4.8 (including) |
Libssh | Libssh | 0.5.0 (including) | 0.5.0 (including) |
Libssh | Libssh | 0.5.0-rc1 (including) | 0.5.0-rc1 (including) |
Libssh | Libssh | 0.5.1 (including) | 0.5.1 (including) |
Libssh | Libssh | 0.5.2 (including) | 0.5.2 (including) |
Libssh | Libssh | 0.5.3 (including) | 0.5.3 (including) |
Libssh | Libssh | 0.5.4 (including) | 0.5.4 (including) |
Libssh | Libssh | 0.5.5 (including) | 0.5.5 (including) |
Libssh | Libssh | 0.6.0 (including) | 0.6.0 (including) |
Libssh | Libssh | 0.6.1 (including) | 0.6.1 (including) |
Libssh | Ubuntu | devel | * |
Libssh | Ubuntu | lucid | * |
Libssh | Ubuntu | precise | * |
Libssh | Ubuntu | quantal | * |
Libssh | Ubuntu | saucy | * |
Libssh | Ubuntu | upstream | * |